Applied Cryptography
Protocols, Algorithms and Source Code in C
Samenvatting
This smart, relevant guide is a must for all those committed to computer and cyber security. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real–world cryptographic algorithms including the Data Encryption Standard and RSA public–key cryptosystems.
This book includes source–code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and keeping keys secure. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.
Written by the world′s most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.
Included in this edition:
- Exclusive forward by Bruce Schneier
- Ways to defeat the key escrow mechanism
- Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
- Protocols for digital signatures, authentication, secure elections, digital cash, and more
- Detailed information on key management and cryptographic implementations
Specificaties
Inhoudsopgave
Foreword
Preface
About the author
1. Foundation
Part 1: CRYPTOGRAPHIC PROTOCOLS.
2. Protocol Building Blocks.
3. Basic Protocols.
4. Intermediate Protocols.
5. Advanced Protocols.
6. Esoteric Protocols.
Part 2: CRYPTOGRAPHIC TECHNIQUES.
7. Key Length.
8. Key Management.
9. Algorithm Types and Modes.
10. Using Algorithms.
Part 3: CRYPTOGRAPHIC ALGORITHMS.
11. Mathematical Background
12. Data Encryption Standard (DES).
13. Other Block Ciphers.
14. Still Other Block Ciphers.
15. Combining Block Ciphers.
16. Pseudo-Randomn-Sequence Generators anmd Stream Ciphers
17. Other Stream Ciphers and Real Random-Sequence Generators
18. One-Way Hash Functions
19. Public-Key Algorithms.
20. Public-Key Digital Signature Algorithms
21. Identification Schemes
22. Key-Exchange Algorithms
23. Special Algorithms for Protocols.
Part 4: THE REAL WORLD.
24. Example Implementations.
25. Politics.
Part 5: SOURCE CODE.source Code.
Source Code
References.
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht